CN107078903B - Ore digging method and device for block chain and node equipment - Google Patents

Ore digging method and device for block chain and node equipment Download PDF

Info

Publication number
CN107078903B
CN107078903B CN201680003221.1A CN201680003221A CN107078903B CN 107078903 B CN107078903 B CN 107078903B CN 201680003221 A CN201680003221 A CN 201680003221A CN 107078903 B CN107078903 B CN 107078903B
Authority
CN
China
Prior art keywords
hash
block
node device
node
consistent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201680003221.1A
Other languages
Chinese (zh)
Other versions
CN107078903A (en
Inventor
张跃洋
谢辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Shanghai Robotics Co Ltd
Original Assignee
Cloudminds Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Inc filed Critical Cloudminds Inc
Publication of CN107078903A publication Critical patent/CN107078903A/en
Application granted granted Critical
Publication of CN107078903B publication Critical patent/CN107078903B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2216/00Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F16/00 and subgroups
    • G06F2216/03Data mining
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Probability & Statistics with Applications (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

a method and a device for digging ores of a block chain and node equipment are used for solving the technical problem that the ore digging machines of the node equipment in a block chain network are not fair enough. The method comprises the following steps: acquiring the current block number of the block chain; judging whether the hash grooves corresponding to the block numbers are consistent with the hash grooves corresponding to the node devices, wherein each node device in the block chain network is distributed in N hash grooves through a hash algorithm, and N is a positive integer greater than or equal to 2; and determining whether the node equipment digs the mine or not according to the judgment result.

Description

Ore digging method and device for block chain and node equipment
Technical Field
the invention relates to the field of block chains, in particular to a block chain mining method, a block chain mining device and node equipment.
Background
the Block chain technology is a distributed, decentralized and distrust-free network data consensus storage technology, and achieves the synchronization problem of distributed computing based on a unique Block (Block) generation mechanism and a P2P (Point to Point) network communication mechanism. In a general sense, in the formation process of a block chain, each node participating in calculation shares the authority of calculating a block, wherein the calculating block is commonly called as 'mining', and the related art ensures that the longest chain is an effective chain through a specific mining mechanism.
in the existing blockchain network, which node device generates a block is related to the computing power of the node device, and the stronger the computing power of one node device is, the more likely it is to generate the block. For example, when the computational power of one node device exceeds the computational power of all other nodes in the whole network, the node device will generate blocks basically every time. Therefore, in the case where the difference in computation force of each node device is large, the existing excavation mechanism cannot guarantee that each node device in the block chain network has an opportunity to dig a mine fairly.
As can be seen from the above, based on the existing mining mechanism, if the same user or organization controls most of the computing power in the blockchain network, monopoly may be formed, and block the normal operation of the blockchain, damage the data of the blockchain, and threaten the security of the blockchain network.
disclosure of Invention
The invention mainly aims to provide a method and a device for excavating a block chain and node equipment, which are used for solving the technical problem that the ore excavators of the node equipment in a block chain network are not fair enough.
In order to achieve the above object, a first aspect of the present invention provides a method for mining a block chain, the method being applied to a node device in a block chain network, the method including:
acquiring the current block number of the block chain;
judging whether the hash grooves corresponding to the block numbers are consistent with the hash grooves corresponding to the node devices, wherein each node device in the block chain network is distributed in N hash grooves through a hash algorithm, and N is a positive integer greater than or equal to 2;
and determining whether the node equipment digs the mine or not according to the judgment result.
A second aspect of the present invention provides an ore excavating device for a node apparatus in a block chain network, the device comprising:
An obtaining module, configured to obtain a current block number of the block chain;
A judging module, configured to judge whether a hash slot corresponding to the block number is consistent with a hash slot corresponding to the node device, where each node device in the block chain network is distributed in N hash slots through a hash algorithm, where N is a positive integer greater than or equal to 2;
and the determining module is used for determining whether the node equipment digs the mine or not according to the judgment result.
A third aspect of the present invention provides a node apparatus, including:
A processor unit, a communication interface, a memory and a communication bus; the processor unit, the communication interface and the memory complete mutual communication through the communication bus;
The memory is used for storing program codes;
the processor unit is adapted to execute the program code to implement the method of the first aspect.
A fourth aspect of the invention provides a computer-readable storage medium for storing a computer program comprising instructions for performing the method of the first aspect.
By adopting the technical scheme, all the node equipment in the block chain network are uniformly distributed in different hash grooves, and the node equipment for mining is also changed along with the increase of the number of the blocks of the current block chain every time, so that the condition that the same node equipment cannot continuously generate the blocks is ensured. Therefore, the probability of digging the ore by the node equipment with strong calculation capacity is reduced, the probability of digging the ore by the node equipment with weak calculation capacity is increased, and the ore digging machine of each node equipment in the block chain network can be fairer.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
fig. 1 is a schematic diagram of a block chain network according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a method for mining a block chain according to an embodiment of the present invention;
Fig. 3 is a schematic diagram of distribution of node devices in a hash slot according to an embodiment of the present invention;
fig. 4A is a schematic structural view of an ore mining device according to an embodiment of the present invention;
FIG. 4B is a schematic structural view of another apparatus for mining according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a node device according to an embodiment of the present invention.
Detailed Description
in order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
in order to make the technical solutions provided by the embodiments of the present invention easier to understand for those skilled in the art, first, related technologies will be briefly described below.
The block chain is a decentralized distributed database system which is jointly maintained by all nodes in a block chain network and consists of a series of data blocks generated based on a cryptography method, wherein each data block is one block in the block chain. The blocks are linked together in order according to the chronological order of the generation times, forming a chain of data, which is referred to visually as a chain of blocks. The blockchain has the security characteristics of being unchangeable, unforgeable and completely traceable due to the special blockchain and the transaction generation and verification protocol.
each tile in the chain of tiles includes some recent transactions, references to previous tiles, and other data, as well as an answer to the computational difficulty that is unique to each tile. The new block cannot be sent to the network without a correct answer. That is, the process of "mining" essentially "resolves" the current block in competition. The mathematical problem in each block is difficult to solve, but once a valid solution is found, it is easy for other network nodes to verify the correctness of this solution. Particularly, in the bit currency, "digging mine" is actually a bookkeeping process, a mechanism called "Proof of Work (PoW)" is adopted for the operation of the bit currency, a system can generate a mathematical problem every time in order to find out who has stronger computing power, and only a computer which can solve the problem at the fastest speed can perform bookkeeping.
in addition, in the blockchain network, not all nodes participate in mining, and some nodes may only have functions of querying and issuing transactions. The nodes involved in mining are referred to as miner nodes, and all the nodes described below are miner nodes.
the block chain and the excavation process thereof will be specifically described below based on fig. 1. As shown in fig. 1, node devices of certain data are connected with each other through a p2p network to form a basic network of block chains. When digging a mine, first, a target value corresponding to a current block needs to be calculated according to a protocol established by a block chain, that is, the target value is F, where F is a target value in a previous block and a time difference between the previous block and the current block. Each node device in the network then generates a very large random number file by seeding with the current block number. Each node device continuously traverses the random number in the random number file and performs hash (random number) operation, when the node device finds a random number v with a hash (v) < target from the file, the round of mining is finished, and the node device which finds the v value first in all the node devices obtains the block writing authority.
Based on the above process, in the case that all the node devices participate in each ore excavation, the probability that the node devices with higher calculation force excavate the ore production block is higher. If an attacker has control over most of the computational power in the blockchain network, resulting in a "51% attack," the data of the blockchain network may be corrupted.
An embodiment of the present invention provides a method for mining a block chain, where the method is applied to a node device in a block chain network, and as shown in fig. 2, the method includes:
s201, acquiring the current block number of the block chain.
The blockchain is synchronized locally at the node device, so that the node device can obtain the current number of blocks by querying the locally stored blockchain.
s202, judging whether the hash groove corresponding to the block number is consistent with the hash groove corresponding to the node equipment.
Each node device in the blockchain network is distributed in N hash grooves through a hash algorithm, wherein N is a positive integer greater than or equal to 2.
And S203, determining whether the node equipment digs the mine at this time according to the judgment result.
That is, before each excavation, the node apparatus needs to go through step S202 to determine whether to perform the excavation by itself this time.
By adopting the method, all the node equipment in the block chain network are uniformly distributed in different hash grooves, and the node equipment for mining changes along with the increase of the number of blocks of the current block chain every time, so that the condition that the same node equipment cannot continuously generate the blocks is ensured. Therefore, the probability of digging the ore by the node equipment with strong calculation capacity is reduced, the probability of digging the ore by the node equipment with weak calculation capacity is increased, and the ore digging machine of each node equipment in the block chain network can be fairer.
in order to make those skilled in the art understand the technical solutions provided by the embodiments of the present invention, the following detailed descriptions are provided for the above steps.
First, how to realize the uniform distribution of each node device in the blockchain network in N hash slots is illustrated.
Performing MD5(Message Digest MD5, the name of Chinese is the fifth edition of Message Digest Algorithm) hash operation on the account information of each node device, and performing modular operation on N (namely, calculating the remainder of N) by using the characteristic that hash results are randomly and uniformly distributed, so that each account corresponds to a hash slot with the number between 0 and N-1.
It should be noted that there may be a case where multiple accounts can log in the same node device, and the account information of the node device described herein refers to current account information of the node device, that is, an account in a blockchain network corresponding to one node device.
As shown in fig. 3, when N is equal to 4, after the account information of the node device is hashed by using the MD5 algorithm, all the node devices may be uniformly distributed in hash slot 0, hash slot 1, hash slot 2, and hash slot 3 after the remainder is found by using the hash value to N, because the hash value has the characteristic of random uniform distribution. That is, each hash slot corresponds to approximately one-fourth of the node devices in the blockchain network. For example, eight node devices 1 to 8 exist in the block chain network, and hash values obtained by sequentially using the MD5 algorithm for the account information of each node device are respectively: 63. 17, 46, 27, 36, 82, 24, 41, the values obtained modulo 4 are: 3. 1, 2, 3, 0, 2, 0, 1. The available node device 5 and the node device 7 correspond to the hash slot 0, the node device 2 and the node device 8 correspond to the hash slot 1, the node device 3 and the node device 6 correspond to the hash slot 2, and the node device 1 and the node device 4 correspond to the hash slot 3.
It is worth to be noted that, by adopting the above method, when a new node device is added to the blockchain network, only the hash slot corresponding to the newly added node device needs to be calculated, and the hash slot of the existing node device does not need to be adjusted, which is convenient for the extension of the blockchain network.
In addition, the foregoing is only an example, and in the embodiment of the present invention, other hash algorithms may also be adopted to uniformly distribute all node devices in each hash slot, which is not limited in the present invention.
In this way, after obtaining the current block number of the blockchain, the calculation of the hash slot corresponding to the block number may be: and performing modular operation on the N by using the current block number to obtain a value which is the number of the corresponding hash groove.
Still referring to fig. 3, if the current number of blocks of the block chain is 8728, and the remainder is performed on 4 to obtain 0, the hash slot corresponding to the current block is hash slot 0.
Further, in a possible implementation manner of the embodiment of the present invention, the step S203 may specifically include: when the hash grooves corresponding to the block number are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment does not dig the ore at this time; and when the hash grooves corresponding to the block numbers are not consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time.
For example, as shown in fig. 3, if the current block number of the block chain is 1 and the remainder of the block number to 4 is equal to 1, the node devices 2 and 8 corresponding to the hash slot 1 do not participate in mining of the next block. After the next block is generated by mining of other node devices, the number of blocks of the block chain is 2, and the remainder of 4 is equal to 2, so that the node device 3 and the node device 6 corresponding to the hash groove 2 do not participate in mining of the 3 rd block. Go on in proper order according to above-mentioned flow, because the constantly increase of block number, the hash groove that corresponds also constantly changes to the node equipment who participates in at every turn and dig the ore also changes, and then same node equipment can't produce the block for several times in succession, has promoted node equipment and has dug the fairness in ore.
It should be noted that, considering that a node device may fail to dig a mine, there may be a situation in the block chain network where no node device participates in a certain mine digging. For example, in fig. 3, when the number of the front blocks is 3, and the remainder of the number of the blocks to 4 is equal to 3, the node devices 1 and 4 corresponding to the hash slot 3 do not participate in ore excavation of the next block, and if all other node devices fail to dig an ore, the case of no node device ore excavation occurs at this time, and the number of blocks of the block chain is not increased.
Therefore, the embodiment of the present invention may further include: and when the hash grooves corresponding to the number of the blocks obtained for M times are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time, wherein M is a positive integer greater than or equal to 2. That is to say, if the number of blocks acquired by a certain node device for M consecutive times is not changed, and the node device does not participate in mine excavation for M-1 consecutive times, the node device can perform mine excavation for the mth time, and normal operation of the block chain network is ensured.
The specific value of M can be preset according to actual conditions. Still taking the example of fig. 3 as an example, if the current block number of the block chain acquired by the node device 1 is 7, since the hash slot corresponding to the block number 7 is the hash slot 3, the node device 1 does not participate in mining the 8 th block at this time. And when the next mine excavation is carried out, if the current block number of the block chain acquired by the node equipment 1 is still 7, indicating that other node equipment does not participate in the previous mine excavation. Thus, in the case where M is equal to 2, the node apparatus 1 determines that excavation is performed this time. Under the condition that M is equal to 4, if the node equipment 1 does not dig the mine at this time, if the number of blocks increases for the next time, it is indicated that other node equipment recovers to dig the mine normally, and if the number of blocks is continuously unchanged for 4 times, the node equipment 1 determines to dig the mine, so that the normal operation of the block chain network is ensured.
Furthermore, after the block is generated, whether the block generated by the node device at this time is legal or not can be verified according to the judgment of the hash slot. Specifically, the method for mining provided by the embodiment of the present invention further includes: receiving a block sent by another node device in the blockchain network, wherein the block comprises account information of the other node device; and when the hash groove corresponding to the block number is determined to be inconsistent with the hash groove corresponding to the other node device, carrying out workload certification on the block.
For example, as shown in fig. 3, after the node device 3 successfully excavates the mine this time, the block is broadcast to other node devices, after the node device 1 receives the block broadcast by the node device 3, MD5 hash operation is performed on account information of the node device 3 to obtain a hash value, a remainder is obtained by using the hash value to 4, so as to determine the hash slot 2 corresponding to the node device 3, and then a remainder is obtained by using the hash value to 4 according to the current block number of the block chain, so as to determine the hash slot corresponding to the current block number, if the hash slot corresponding to the current block number is not consistent with the hash slot corresponding to the node device 3, it is indicated that the node device 3 is legal to excavate the mine this time, and a workload certification can be performed on the block. If the hash slot corresponding to the current block number is consistent with the hash slot corresponding to the node device 3, indicating that the node device 3 is not legal to mine at this time, the node device 1 may discard the block to refuse to add the block to the block chain. Alternatively, when the hash slot corresponding to the current block number is consistent with the hash slot corresponding to the node device 3 and the block number of the current block chain has not changed for M times, the node device 1 may consider that the node device 3 is legal to mine at this time, and may further perform workload certification on the block. In specific implementation, the node 1 may comprehensively determine whether the current ore excavation of the node 3 is legal by combining the hash slot and the time difference between the block and the previous block.
In another possible implementation manner of the embodiment of the present invention, step S203 may further include: when the hash grooves corresponding to the block numbers are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time; and when the hash grooves corresponding to the block numbers are not consistent with the hash grooves corresponding to the node equipment, determining that the node equipment does not dig the mine at this time.
For example, as shown in fig. 3, if the current block number of the block chain is 1 and the remainder of the block number to 4 is equal to 1, node devices 2 and 8 corresponding to the hash slot 1 participate in mining of the next block, and all other node devices do not participate in mining of the next block. After the node device 2 or the node device 8 excavates the mine to generate the next block, the number of blocks of the block chain is 2, and the remainder of 4 is equal to 2, then the node device 3 and the node device 6 corresponding to the hash slot 2 participate in the mine excavation of the 3 rd block, and other node devices do not participate in the mine excavation of the 3 rd block. Go on in proper order according to above-mentioned flow, because the constantly increase of block number, the hash groove that corresponds also constantly changes to the node equipment who participates in at every turn and dig the ore also changes, and then same node equipment can't produce the block for several times in succession, has promoted node equipment and has dug the fairness in ore.
Similarly, considering that a node device may fail to dig a mine, there may be a situation in the blockchain network where no node device participates in a certain excavation. The embodiment of the present invention may further include determining that the node device performs ore excavation this time when all hash grooves corresponding to the number of blocks obtained for L consecutive times are inconsistent with the hash groove corresponding to the node device, where L is a positive integer greater than or equal to N.
That is to say, for N hash grooves, under normal conditions, one node device may participate in mining at least once every N times, and if a certain node device does not participate in mining for L-1 times continuously, it indicates that other node devices may fail, so that the node device may dig mining when the hash groove corresponding to the L-th determined block number continuously is inconsistent with the hash groove corresponding to the node device, thereby ensuring normal operation of the block chain network.
The two possible implementation manners are only examples, and in specific implementation, whether to perform ore excavation each time may be determined according to a specific service configuration node device in what manner.
the effect that can be achieved by the ore excavation method provided by the embodiment of the invention is analyzed in the following manner aiming at the first possible implementation manner.
As illustrated in fig. 3, all node devices on the blockchain are assigned 4 hash slots by using the account MD5 hash value. Modulo 4 by the number of blocks, this hits the slot in sequence from hash slot 0 to hash slot 3. Each node device in the slot is prohibited to participate in ore excavation periodically, so that the purpose of prohibiting strong computing power node devices from excavating ores is achieved, monopoly of the strong computing power node devices on block chains is avoided, and the difficulty of double-flower attack of attackers is improved. The existing workload proving mechanism can realize the double-flower attack only by one strong-computing node device, and after the embodiment of the invention is adopted, at least 4 strong-computing nodes are needed to realize the double-flower attack, thereby improving the crime cost of an attacker.
the fault tolerance and attack resistance of the embodiments of the present invention are analyzed as follows. If the probability of the fault of each node device is 2.5%, the probability of each node device being attacked maliciously is 25%, the number of hash slots is 4, and the total number of the node devices is X, when other node devices fail, the total number of available node devices is less than X/4, and all the available node devices are in the same slot, freezing occurs, that is, there is no node device participating in ore excavation, the probability distribution of the situation conforms to the cumulative binomial distribution, the experimental result shows that when X is 5, the probability of freezing occurs is 1.914E-6, that is, the probability of parts per million, and the probability of freezing gradually approaches 0 with the increase of X, which indicates that the block chain network adopting the ore excavation method provided by the embodiment of the present invention has a high fault tolerance capability.
for the anti-attack capability, when the total number of available node devices is smaller than X/4 and all are in the same slot position due to the attack, the situation that the write of the whole block is completely mastered by an intruder occurs. This probability also follows a cumulative binomial distribution, and experimental results show that the probability of occurrence being controlled is 3.9482E-6 when X is 18, after which the probability will gradually approach 0 as X increases. The block chain network adopting the mining method provided by the embodiment of the invention has higher anti-attack capability.
Therefore, by adopting the method provided by the embodiment of the invention, the mining opportunities of each node device in the block chain network are fairer on the premise of ensuring that the block chain network has enough fault tolerance capability and attack resistance capability.
an embodiment of the present invention further provides a mining device 40, where the mining device 40 is used for a node device in a block chain network, and is used to implement the block chain mining method provided in the foregoing method embodiment, as shown in fig. 4A, the mining device 40 includes:
an obtaining module 401, configured to obtain a current block number of the block chain;
a determining module 402, configured to determine whether a hash slot corresponding to the block number is consistent with a hash slot corresponding to the node device, where each node device in the block chain network is distributed in N hash slots through a hash algorithm, where N is a positive integer greater than or equal to 2;
And a determining module 403, configured to determine whether the node device performs ore excavation this time according to the determination result.
by adopting the ore digging device, all node equipment in the block chain network are uniformly distributed in different hash grooves, and the node equipment for digging the ore also changes along with the increase of the number of blocks of the current block chain every time, so that the situation that the same node equipment cannot continuously generate the blocks is ensured. Therefore, the probability of digging the ore by the node equipment with strong calculation capacity is reduced, the probability of digging the ore by the node equipment with weak calculation capacity is increased, and the ore digging machine of each node equipment in the block chain network can be fairer.
optionally, the determining module 403 is configured to determine that the node device does not perform ore excavation this time when the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device; and when the hash grooves corresponding to the block numbers are not consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time.
Optionally, the determining unit 403 is configured to determine that the node device performs ore excavation this time when all hash slots corresponding to the number of blocks obtained M consecutive times are consistent with a hash slot corresponding to the node device, where M is a positive integer greater than or equal to 2.
Optionally, as shown in fig. 4B, the ore excavating device 40 further includes: a calculating unit 404, configured to perform a modulus operation on N by using the block number to obtain a first modulus value; carrying out modular operation on N according to an MD5 algorithm by using the account information of the node equipment to obtain a second modular value; the determining module 402 is configured to determine whether the first modulus value is consistent with the second modulus value, where a consistency of the first modulus value with the second modulus value indicates that the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device, and a inconsistency of the first modulus value with the second modulus value indicates that the hash slot corresponding to the block number is inconsistent with the hash slot corresponding to the node device.
Optionally, as shown in fig. 4B, the ore excavating device 40 further includes: a receiving module 405, configured to receive a block sent by another node device in the blockchain network, where the block includes account information of the another node device; a workload certification module 406, configured to perform workload certification on the block when it is determined that the hash slot corresponding to the number of blocks is inconsistent with the hash slot corresponding to the another node device.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the functional module, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
An embodiment of the present invention further provides a node device 50, configured to implement the method for block chain mining provided in the foregoing method embodiment, as shown in fig. 5, where the node device 50 includes:
A processor unit 501, a communication interface 502, a memory 503, and a communication bus 504; the processor unit 501, the communication interface 502 and the memory 503 are communicated with each other through the communication bus 504.
the processor unit 501 may be a multi-core central processing unit CPU, or an ASIC (Application Specific Integrated Circuit), or one or more Integrated circuits configured to implement embodiments of the present invention.
The memory 503 is used to store program code, including computer operating instructions and network flow diagrams. The memory 503 may carry high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
the communication interface 502 is used for implementing connection communication between the node devices.
The processor unit 501 executes a program code, which is configured to implement the method for mining a block chain according to the above method embodiment when running, and the method includes:
Acquiring the current block number of the block chain;
Judging whether the hash grooves corresponding to the block numbers are consistent with the hash grooves corresponding to the node devices, wherein each node device in the block chain network is distributed in N hash grooves through a hash algorithm, and N is a positive integer greater than or equal to 2;
And determining whether the node equipment digs the mine or not according to the judgment result.
Optionally, the determining, according to the determination result, whether the node device performs ore excavation at this time includes:
when the hash grooves corresponding to the block number are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment does not dig the ore at this time;
And when the hash grooves corresponding to the block numbers are not consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time.
Optionally, the determining, according to the determination result, whether the node device performs ore excavation at this time includes:
and if the hash grooves corresponding to the number of the blocks obtained for M times are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment excavates the mine at this time, wherein M is a positive integer greater than or equal to 2.
Optionally, the determining whether the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device includes:
Performing modular operation on N by using the block number to obtain a first modular value;
carrying out modular operation on N according to an MD5 algorithm by using the account information of the node equipment to obtain a second modular value;
and judging whether the first modulus value is consistent with the second modulus value, wherein the consistency of the first modulus value and the second modulus value indicates that the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device, and the inconsistency of the first modulus value and the second modulus value indicates that the hash slot corresponding to the block number is inconsistent with the hash slot corresponding to the node device.
optionally, the method further comprises:
Receiving a block sent by another node device in the blockchain network, wherein the block comprises account information of the other node device;
And when the hash groove corresponding to the block number is determined to be inconsistent with the hash groove corresponding to the other node device, carrying out workload certification on the block.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the functional blocks is only one logical functional division, and there may be other divisions when the actual implementation is performed.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware form, and can also be realized in a form of hardware and a software functional module.
The integrated module implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing data. That is, an embodiment of the present invention also provides a computer-readable storage medium for storing a computer program including instructions for executing the method for mining a block chain as described above.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a mining method of a block chain is applied to node equipment in a block chain network, and the method comprises the following steps:
acquiring the current block number of the block chain;
Judging whether the hash grooves corresponding to the block numbers are consistent with the hash grooves corresponding to the node devices, wherein each node device in the block chain network is distributed in N hash grooves through a hash algorithm, and N is a positive integer greater than or equal to 2;
determining whether the node equipment digs the mine or not according to the judgment result; wherein the determining whether the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device comprises: performing modular operation on N by using the block number to obtain a first modular value; carrying out modular operation on N according to a Hash algorithm by using the account information of the node equipment to obtain a second modular value; and judging whether the first modulus value is consistent with the second modulus value, wherein the consistency of the first modulus value and the second modulus value indicates that the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device, and the inconsistency of the first modulus value and the second modulus value indicates that the hash slot corresponding to the block number is inconsistent with the hash slot corresponding to the node device.
2. The method according to claim 1, wherein the determining whether the node device performs ore excavation at this time according to the judgment result comprises:
When the hash grooves corresponding to the block number are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment does not dig the ore at this time;
and when the hash grooves corresponding to the block numbers are not consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time.
3. the method according to claim 1, wherein the determining whether the node device performs ore excavation at this time according to the judgment result comprises: and if the hash grooves corresponding to the number of the blocks obtained for M times are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment excavates the mine at this time, wherein M is a positive integer greater than or equal to 2.
4. The method according to any one of claims 1 to 3, further comprising:
receiving a block sent by another node device in the blockchain network, wherein the block comprises account information of the other node device;
and when the hash groove corresponding to the block number is determined to be inconsistent with the hash groove corresponding to the other node device, carrying out workload certification on the block.
5. An apparatus for mining, the apparatus being for a node device in a block chain network, the apparatus comprising:
an obtaining module, configured to obtain a current block number of the block chain;
The calculating unit is used for carrying out modular operation on the N by utilizing the block number to obtain a first modular value; carrying out modular operation on N according to a Hash algorithm by using the account information of the node equipment to obtain a second modular value;
A judging module, configured to judge whether a hash slot corresponding to the block number is consistent with a hash slot corresponding to the node device, where each node device in the block chain network is distributed in N hash slots through a hash algorithm, where N is a positive integer greater than or equal to 2; and
Judging whether the first modulus value is consistent with the second modulus value, wherein the consistency of the first modulus value and the second modulus value indicates that the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device, and the inconsistency of the first modulus value and the second modulus value indicates that the hash slot corresponding to the block number is inconsistent with the hash slot corresponding to the node device;
And the determining module is used for determining whether the node equipment digs the mine or not according to the judgment result.
6. The apparatus according to claim 5, wherein the determining module is configured to determine that the node device does not excavate the mine this time when the hash slot corresponding to the block number is consistent with the hash slot corresponding to the node device; and when the hash grooves corresponding to the block numbers are not consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time.
7. The apparatus of claim 5, wherein the determination module is configured to,
and when the hash grooves corresponding to the number of the blocks obtained for M times are consistent with the hash grooves corresponding to the node equipment, determining that the node equipment digs the mine at this time, wherein M is a positive integer greater than or equal to 2.
8. The apparatus of any one of claims 5 to 7, further comprising:
A receiving module, configured to receive a block sent by another node device in the blockchain network, where the block includes account information of the another node device;
And the workload certification module is used for carrying out workload certification on the blocks when the hash grooves corresponding to the block numbers are determined to be inconsistent with the hash grooves corresponding to the other node device.
9. A node apparatus, comprising:
A processor unit, a communication interface, a memory and a communication bus; the processor unit, the communication interface and the memory complete mutual communication through the communication bus;
The memory is used for storing program codes; the processor unit is adapted to execute the program code to implement the method of any of claims 1 to 4.
10. A computer-readable storage medium for storing a computer program comprising instructions for performing the method of any of claims 1 to 4.
CN201680003221.1A 2016-12-23 2016-12-23 Ore digging method and device for block chain and node equipment Active CN107078903B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/111860 WO2018112949A1 (en) 2016-12-23 2016-12-23 Block chain mining method, device, and node apparatus

Publications (2)

Publication Number Publication Date
CN107078903A CN107078903A (en) 2017-08-18
CN107078903B true CN107078903B (en) 2019-12-06

Family

ID=59624459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680003221.1A Active CN107078903B (en) 2016-12-23 2016-12-23 Ore digging method and device for block chain and node equipment

Country Status (3)

Country Link
US (1) US10664485B2 (en)
CN (1) CN107078903B (en)
WO (1) WO2018112949A1 (en)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368507B (en) * 2017-03-28 2020-03-27 创新先进技术有限公司 Block chain-based consensus method and device
US10762479B2 (en) * 2017-04-05 2020-09-01 Samsung Sds Co., Ltd. Method and system for processing blockchain-based real-time transaction
US10812270B2 (en) * 2017-04-07 2020-10-20 Citizen Hex Inc. Techniques for increasing the probability that a transaction will be included in a target block of a blockchain
CN108241926B (en) * 2017-08-25 2020-07-10 杭州复杂美科技有限公司 Block chain authorization consensus method
CN107733651B (en) * 2017-09-11 2020-06-19 联动优势科技有限公司 Block chain generation method, node and system
CN107911819B (en) * 2017-11-30 2020-11-27 江苏通付盾科技有限公司 Method and system for selecting packaging node based on mobile phone number
CN110109913B (en) * 2018-01-15 2021-05-04 北京比特大陆科技有限公司 Hardware implementation method and device of zerocase mining algorithm
CN108512650B (en) * 2018-02-28 2021-03-09 南京思利华信息科技有限公司 Block chain-oriented dynamic hash calculation method, device, node and storage medium
CN108306898B (en) * 2018-04-23 2021-02-05 北京奇宝科技有限公司 Sensing method and device for block chain attack event, computing equipment and storage medium
CN108596617B (en) * 2018-04-23 2020-11-20 北京奇虎科技有限公司 Block chain attack event sensing method and device and computer storage medium
CN108566398B (en) * 2018-04-23 2020-10-27 北京奇虎科技有限公司 Block chain attack event sensing method and device and computer storage medium
CN108551454B (en) * 2018-04-23 2020-10-30 北京奇虎科技有限公司 Block chain attack event sensing method and device and computer storage medium
CN109033832B (en) * 2018-06-22 2021-02-09 深圳前海益链网络科技有限公司 Method for preventing transient bifurcation double-flower attack on block chain network
GB201811263D0 (en) * 2018-07-10 2018-08-29 Netmaster Solutions Ltd A method and system for managing digital using a blockchain
CN109242676B (en) * 2018-07-27 2023-10-27 创新先进技术有限公司 Block issuing method and device and electronic equipment
CN109238758B (en) * 2018-08-02 2020-12-18 李淑芹 Method and device for detecting faults of block chain mining machine
CN109194718A (en) * 2018-08-09 2019-01-11 玄章技术有限公司 A kind of block chain network and its method for scheduling task
CN108989464A (en) * 2018-08-29 2018-12-11 上海常仁信息科技有限公司 A kind of digging mine robot system based on block chain
CN109242491A (en) * 2018-08-31 2019-01-18 深圳付贝科技有限公司 It digs mine identity identifying method, dig mine machine and block catenary system
CN109376115B (en) * 2018-08-31 2020-09-15 北京智云芯科技有限公司 Computing device and computing method based on workload certification
US10834122B2 (en) * 2018-09-05 2020-11-10 International Business Machines Corporation Prevention of majority attacks
CN109410050B (en) * 2018-09-27 2021-08-06 杭州复杂美科技有限公司 Ore digging time consumption correction method, device and storage medium
CN109462641B (en) * 2018-10-30 2021-12-10 深圳市元征科技股份有限公司 User communication method, system, equipment and computer readable storage medium
CN109993511B (en) * 2019-04-01 2021-07-06 北京众享比特科技有限公司 Block verification method
SG11201909630TA (en) * 2019-04-26 2019-11-28 Alibaba Group Holding Ltd Anti-replay attack authentication protocol
CN110113172B (en) * 2019-04-29 2022-04-15 深圳市元征科技股份有限公司 Difficulty adjustment method and related equipment
CN110245950B (en) * 2019-06-17 2020-08-04 北京瑞策科技有限公司 Block discharging method and device related to block chain
CN110222537B (en) * 2019-06-17 2021-01-29 北京瑞策科技有限公司 Verification method and device applied to block chain nodes
TWI706346B (en) * 2019-10-31 2020-10-01 鴻海精密工業股份有限公司 Mining machine, storage medium, and method for limiting calculation power of mining machine
CN110991955B (en) * 2019-11-27 2023-04-18 太原理工大学 Group quantity diversity estimation method based on information moments
CN110989934B (en) * 2019-12-05 2023-08-25 达闼机器人股份有限公司 Block chain link point data storage method, block chain system and block chain node
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
CN111324489B (en) * 2020-02-18 2023-04-07 杭州复杂美科技有限公司 Main chain game result display method, equipment and storage medium
CN111355608A (en) * 2020-02-18 2020-06-30 杭州复杂美科技有限公司 Block chain rollback exception identification method, system, equipment and storage medium
US11682095B2 (en) 2020-02-25 2023-06-20 Mark Coast Methods and apparatus for performing agricultural transactions
CN111683120A (en) * 2020-05-22 2020-09-18 哈尔滨工程大学 Alliance node storage method supporting dynamic change of verification node
CN113259186B (en) * 2021-07-07 2021-10-08 发明之家(北京)科技有限公司 New block monitoring method and system for block chain
CN113836147A (en) * 2021-11-26 2021-12-24 广东辰宜信息科技有限公司 Chain identifier generation method and device, chain cluster management method, system and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015077378A1 (en) * 2013-11-19 2015-05-28 Sunrise Tech Group, Llc Block mining methods and apparatus
CN105469510A (en) * 2014-10-12 2016-04-06 吴思进 Encryption currency wallet capable of noticing in advance delayed payment or finding
CN105683898A (en) * 2014-01-17 2016-06-15 网络装置公司 Set-associative hash table organization for efficient storage and retrieval of data in a storage system
CN106060036A (en) * 2016-05-26 2016-10-26 布比(北京)网络技术有限公司 Decentralized consenting method and apparatus

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9268653B2 (en) * 2014-01-17 2016-02-23 Netapp, Inc. Extent metadata update logging and checkpointing
US9973341B2 (en) * 2015-01-23 2018-05-15 Daniel Robert Ferrin Method and apparatus for the limitation of the mining of blocks on a block chain
CN106296184A (en) * 2015-06-05 2017-01-04 地气股份有限公司 Electronic money management method and electronic-monetary system
US20170345011A1 (en) * 2016-05-26 2017-11-30 Hitfin, Inc. System and method executed on a blockchain network
US10454765B2 (en) * 2016-07-15 2019-10-22 Mastercard International Incorporated Method and system for node discovery and self-healing of blockchain networks
US10726346B2 (en) * 2016-11-09 2020-07-28 Cognitive Scale, Inc. System for performing compliance operations using cognitive blockchains
US10621233B2 (en) * 2016-11-09 2020-04-14 Cognitive Scale, Inc. Cognitive session graphs including blockchains
US10628491B2 (en) * 2016-11-09 2020-04-21 Cognitive Scale, Inc. Cognitive session graphs including blockchains

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015077378A1 (en) * 2013-11-19 2015-05-28 Sunrise Tech Group, Llc Block mining methods and apparatus
CN105683898A (en) * 2014-01-17 2016-06-15 网络装置公司 Set-associative hash table organization for efficient storage and retrieval of data in a storage system
CN105469510A (en) * 2014-10-12 2016-04-06 吴思进 Encryption currency wallet capable of noticing in advance delayed payment or finding
CN106060036A (en) * 2016-05-26 2016-10-26 布比(北京)网络技术有限公司 Decentralized consenting method and apparatus

Also Published As

Publication number Publication date
US10664485B2 (en) 2020-05-26
CN107078903A (en) 2017-08-18
US20190310980A1 (en) 2019-10-10
WO2018112949A1 (en) 2018-06-28

Similar Documents

Publication Publication Date Title
CN107078903B (en) Ore digging method and device for block chain and node equipment
US20220173888A1 (en) Blockchain consensus methods and systems
Aniello et al. A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database
CN107274159B (en) Accounting system and method based on block concurrency execution algorithm
JP7289298B2 (en) Computer-implemented system and method for authorizing blockchain transactions using low-entropy passwords
JP7208930B2 (en) Release of controlled cryptographic private keys
CN112001502B (en) Federal learning training method and device for high-delay network environment robustness
US11121880B2 (en) Method for reaching consensus on public distributed ledgers and system using the same
CN110741600A (en) Computer-implemented system and method for providing a decentralized protocol to retrieve encrypted assets
Wang et al. Corking by forking: Vulnerability analysis of blockchain
CN111061769A (en) Consensus method of block chain system and related equipment
EP4006742A1 (en) Fork processing method and blockchain node
CA3037833A1 (en) System and method for information protection
EP3545645B1 (en) System architecture and method of processing data therein
CN106296196A (en) Digital cash transaction signature method and system and digital cash transaction system thereof
CN110704464B (en) Method and device for processing bifurcation problem
CN111033491A (en) Storing shared blockchain data based on error correction coding
Li et al. Gosig: Scalable byzantine consensus on adversarial wide area network for blockchains
CN111865595B (en) Block chain consensus method and device
CN112487091A (en) Method and device for determining block chain consensus node
CN114402352A (en) Method and apparatus for tracking and measuring a proof of work contribution in a mine
CN113939821A (en) System and method for non-parallel mining on a workload justification blockchain network
CN115134359B (en) Block chain consensus mechanism and system capable of resisting parallel mining and disclosing and verifying block right
CN109274674B (en) Block chain heterogeneous consensus method with high security and terminal
CN110149213B (en) Workload proving method and system based on heterogeneous hash function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210315

Address after: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Patentee after: Dalu Robot Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: Shenzhen Qianhaida Yunyun Intelligent Technology Co.,Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 201111 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Patentee after: Dayu robot Co.,Ltd.

Address before: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Patentee before: Dalu Robot Co.,Ltd.